• A Little Help From My Friend's…...

    1
    0 Votes
    1 Posts
    705 Views
    No one has replied
  • OpenVPN other than UDP 1194 (i.e. TCP 21)

    19
    0 Votes
    19 Posts
    7k Views
    M

    Bump…

  • Clients can't connect after Site to Site Tunnel

    3
    0 Votes
    3 Posts
    981 Views
    E

    Hmm. No local DNS resolution, but no routes to the Internet either. Frustrating.

  • VPN Clients can't get internet

    1
    0 Votes
    1 Posts
    639 Views
    No one has replied
  • OpenVPN LZO vulnerability

    5
    0 Votes
    5 Posts
    1k Views
    jimpJ

    Their analysis was better than mine but reached the same conclusion. There's no way to exploit it via OpenVPN.

    It's still difficult to exploit even using other methods.

    http://it.slashdot.org/story/14/06/28/1949243/are-the-hard-to-exploit-bugs-in-lzo-compression-algorithm-just-hype

  • Cannot access certain things on OpenVPN

    1
    0 Votes
    1 Posts
    662 Views
    No one has replied
  • Pfsense openvpn server <-> openvpn ubuntu 14.04 lts client (undef error)

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Site-to-Site OpenVPN behind Router

    1
    0 Votes
    1 Posts
    877 Views
    No one has replied
  • OpenVPN Client<->Client

    1
    0 Votes
    1 Posts
    835 Views
    No one has replied
  • Followed this guide but getting lots of packet loss and high pings

    2
    0 Votes
    2 Posts
    735 Views
    E

    Apparently the lag was due to packet loss on the servers wan adapter.

    The stupid part is that server has 2 WAN's. DSL and cable. The OpenVPN server is setup to use the CLUSTER (combined) adapter. My client is setup to connect on either IP address. For some reason the load balancing wouldn't kill the cable connection with the heavy packet loss. Even though in the gateways have settings of 1 and 3 in the packet loss threshold with a down of 4.

    Any idea why the cable connection would not boot itself from the load balancing cluster? :/

  • After update to 2.1.4-RELEASE openvpn is gone

    3
    0 Votes
    3 Posts
    1k Views
    J

    @jimp:

    Any CARP VIPs? IP aliases on CARP VIPs?

    hi Jimp,
    i think is something with the installed certificate or with previous installation of Pfsense.
    i tried the same profile on a different computer a never installed Openvpn and it works.
    is there is away to clean all installed certificate of Pfsense ? and all other trach ?

    i fixed the problem,
    for people with the same problem,
    go to cert manager on your windows and delete the openvpn certificate,
    remove openvpn and install it again

  • Problem with Client Especific Overrides

    2
    0 Votes
    2 Posts
    857 Views
    F

    Sorry, solved.

    Enter any additional options you would like to add for this client specific override, separated by a semicolon EXAMPLE: push "route 10.0.0.0 255.255.255.0";
  • OpenVPN add firewall rule?

    5
    0 Votes
    5 Posts
    1k Views
    P

    Ok will do. thanks for that.

  • How do I get the OpenVPN client to accept our self-signed cert?

    4
    0 Votes
    4 Posts
    2k Views
    H

    @heper:

    you probably did something wrong in generating the certs. (no clue what)

    just start from scratch and try again with new a CA
    generate the servercert&usercert from the newly created CA.

    should be fine

    Alright, will do. Thanks.

  • OPEN-VPN RADUIS AD works between subnets

    1
    0 Votes
    1 Posts
    512 Views
    No one has replied
  • OpenVPN help

    2
    0 Votes
    2 Posts
    545 Views
    C

    Please don't hijack unrelated posts, split this into its own thread.

  • How do I set up openvpn server and implement described sec

    1
    0 Votes
    1 Posts
    533 Views
    No one has replied
  • VPN Route for netflix, torrents only

    3
    0 Votes
    3 Posts
    2k Views
    R

    I don't know if this is a perfect solution but it works.  This will help with Netflix but not with torrent traffic.

    After setting up the VPN to work, create this firewall rule and leave it on top.

    set to: Pass
    Interface: LAN
    Source:  Local ip address of what is using netflix
    Destination: any
    Gateway: your vpn

    This will make  only that device send all of its traffic through the vpn.  Remember you have to give it a static ip address in status-> dhcp leases  .  To prevent the rest of your network from being on that vpn, you have to set a kill switch rule under that.  I think this will work.

    set to: Block
    Interface: LAN
    Source:  LAN Address    <–-( exact words by the way)
    Destination: any
    Gateway: your vpn

  • I cant use openVPN behind my pfsense fw, but behind other fw's.

    12
    0 Votes
    12 Posts
    2k Views
    F

    @chemlud:

    Is snort involved  on your pfSense? I would wireshark the LAN side, to see what's going on between the laptop and the pfSense box… :)

    You got me on the right track,, thanks.

    No I dont have snort on the fw….but...

    I hade a D-link switched called DGS-1210-16 with a Security option enabled.

    The switch itself can protect from:

    Land Attack
    Blat Attack
    TCP Null Scan
    TCP Xmascan
    TCP SYNFIN
    TCP SYN Src Port Less 1024
    Ping Death Attack
    TCP Tiny Frag Attack

    And the problem was the Blat Attack rule, if I disabled it on the Switch then the OpenVPN connection worked perfect.

    Thanks to all that tried to help.

  • STRONGVPN OpenVPN Client Config

    1
    0 Votes
    1 Posts
    812 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.